A simple, LFI vulnerable PHP application
☆18Sep 27, 2018Updated 7 years ago
Alternatives and similar repositories for vulnerable-lfi
Users that are interested in vulnerable-lfi are comparing it to the libraries listed below
Sorting:
- A collection of tools for the Janus exploit [CVE-2017-13156].☆10Oct 22, 2019Updated 6 years ago
- Proof of concept about a path traversal vulnerability in Microsoft's Diagcab technology that could lead to remote code execution☆23Jun 16, 2022Updated 3 years ago
- WiFi Scanner and Default WPS PIN Generator for Livebox 2.1 and Lievbox Next from Orange (Spain)☆21Oct 5, 2021Updated 4 years ago
- SecDojo 23jan CTF writeup.☆14Jan 25, 2022Updated 4 years ago
- ☆12Apr 8, 2025Updated 11 months ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Mar 21, 2019Updated 6 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆11Jun 21, 2018Updated 7 years ago
- Network Shredder IDS☆11Aug 14, 2024Updated last year
- This shell script fix VMWare 17.x "cannot open /dev/vmmon" error in Ubuntu 21.10 and Ubuntu 22.04☆11Feb 5, 2023Updated 3 years ago
- Regex based secret scanner for sccm deployment points sccmcontentlib$ shares. Find secrets automatically and download entire packages for…☆18Aug 13, 2025Updated 6 months ago
- A Sublime Text plugin that allows for Nmap syntax highlighting☆13Sep 14, 2024Updated last year
- Undetectable Windows Payload Generation☆10Dec 2, 2017Updated 8 years ago
- Clone an Android Virtual Device for easy distribution through the Android SDK Manager.☆16Jul 9, 2012Updated 13 years ago
- Доступ к плейлистам с ForkPlayer по мак адресам с привязкой к Личному кабинету☆14Sep 15, 2019Updated 6 years ago
- Ray-casting game for wasting productive time.☆11May 23, 2021Updated 4 years ago
- PDump is a project for dumping leaked credentials from DEHASHED☆17Jan 21, 2024Updated 2 years ago
- A tool to guess the rest of the shortnames provided by vulnerable IIS instances.☆41Aug 12, 2023Updated 2 years ago
- Custom ASIC Design for SHA-256☆14Nov 22, 2025Updated 3 months ago
- Enables use of intentionally disabled cmdline args in Alan Wake 2☆12Nov 15, 2023Updated 2 years ago
- An archive of the challenges found in the Blackhat MEA 2024 Qualifiers CTF☆11Sep 2, 2024Updated last year
- Go package to make lightweight ASCII line graph ╭┈╯ in command line apps with no other dependencies.☆10Jun 5, 2019Updated 6 years ago
- ☆10Aug 9, 2024Updated last year
- Exploit Pack - One step ahead☆12Sep 9, 2013Updated 12 years ago
- Inject code into .net applications☆13Nov 7, 2018Updated 7 years ago
- A Buttplug client application that lets you control your vibrating sex toys with sequencers☆14Apr 25, 2021Updated 4 years ago
- Keygen☆12Feb 3, 2017Updated 9 years ago
- 3D (Stereoscopic) Camera streamer using two Raspberry Pi Zeros and two Pi Cameras in a ProtoStax Enclosure☆10Jan 9, 2025Updated last year
- HP Data Protector Arbitrary Remote Command Execution☆11Aug 12, 2018Updated 7 years ago
- Script to read information from Landis+Gyr Ultraheat (UH50, T550)☆11May 6, 2023Updated 2 years ago
- HybVIO SLAM module☆14Nov 24, 2021Updated 4 years ago
- ☆13Nov 3, 2023Updated 2 years ago
- ARMANDroid - anti-repackaging tool for Android apps☆15Dec 18, 2020Updated 5 years ago
- Google Dorking Payloads☆12Jun 24, 2024Updated last year
- POC for CVE-2020-9484☆13Feb 10, 2021Updated 5 years ago
- ☆11Dec 31, 2018Updated 7 years ago
- ☆21Nov 13, 2025Updated 3 months ago
- UEVR fixes for FINAL FANTASY VII REMAKE INTERGRADE☆13Feb 24, 2024Updated 2 years ago
- A blind XXE injection callback handler. Uses HTTP and FTP to extract information. Originally written in Ruby by ONsec-Lab.☆10Mar 18, 2019Updated 6 years ago
- Description and exploit of CVE-2023-33831 affecting FUXA web-based Process Visualization (SCADA/HMI/Dashboard) software.☆10Oct 27, 2024Updated last year